ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.

Slides:



Advertisements
Similar presentations
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Advertisements

1 Network Security Ola Flygt Växjö University
Some general principles in computer security Tomasz Bilski Chair of Control, Robotics and Computer Science Poznań University.
G53SEC 1 Revision & Exam Tips G53SEC. 2 Today’s Lecture: Revision Summary + Tips Exam Tips Preliminary Coursework Feedback.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
FIT3105 Smart card based authentication and identity management Lecture 4.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Chapter 1  Introduction 1 Overview  What is a secure computer system?  Concerns of a secure system o Data: Privacy, Integrity, Availability o Users:
Blekinge Institute of Technology, Sweden
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
MJ10/07041 Session 10 Accounting, Security Management Adapted from Network Management: Principles and Practice © Mani Subramanian 2000 and solely used.
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Bazara Barry1 Security on Networks and Information Systems Bazara I. A. Barry Department of Computer Science – University of Khartoum
Introduction (Pendahuluan)  Information Security.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Computer Legislation The need for computer laws Go to Contents.
Introduction to Computer Security1 Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester University of.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
NETWORK SECURITY. TextBook William Stallings, Cryptography and Network Security: Principles and Practice, ? Edition.
Privacy, Confidentiality, and Security Unit 8: Professional Values and Medical Ethics Lecture 2 This material was developed by Oregon Health & Science.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Henric Johnson1 Network Security Henric Johnson Blekinge Institute of Technology, Sweden
Privacy, Confidentiality, and Security Component 2/Unit 8c.
Csci5233 computer security & integrity 1 Cryptography: an overview.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Introduction to Information Security
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Chapter 19 Manager of Information Systems. Defining Informatics Process of using cognitive skills and computers to manage information.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
ICC Module 3 Lesson 1 – Computer Architecture 1 / 12 © 2015 Ph. Janson Information, Computing & Communication Computer Architecture Clip 6 – Logic parallelism.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 2 – Privacy School of Computer Science.
ICC Module 3 Lesson 4 – Networking 1 / 8 © 2015 Ph. Janson Information, Computing & Communication Networking – Clip 4 – Switching School of Computer Science.
ICC Module 3 Lesson 4 – Networking 1 / 16 © 2015 Ph. Janson Information, Computing & Communication Networking – Clip 3 – Protocol encapsulation School.
ICC Module 3 Lesson 2 – Memory Hierarchies 1 / 6 © 2015 Ph. Janson Information, Computing & Communication Memory Hierarchies – Clip 2 – Concept School.
ICC Module 3 Lesson 4 – Networking 1 / 9 © 2015 Ph. Janson Information, Computing & Communication Networking – Clip 6 – Internet addressing School of.
ICC Module 3 Lesson 1 – Computer Architecture 1 / 6 © 2015 Ph. Janson Information, Computing & Communication Computer Architecture Clip 3 – Instruction.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Network Security and Cryptography
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
ICC Module 3 Lesson 4 – Networking 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Networking – Clip 0 – Introduction School of Computer.
ICC Module 3 Lesson 2 – Memory Hierarchies 1 / 14 © 2015 Ph. Janson Information, Computing & Communication Memory Hierarchies – Clip 5 – Reading School.
ICC Module 3 Lesson 1 – Computer Architecture 1 / 11 © 2015 Ph. Janson Information, Computing & Communication Module 3 : Systems.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
ICC Module 3 Lesson 3 – Storage 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Storage – Clip 0 – Introduction School of Computer Science.
3/30/04Sergio Caltagirone Human/Computer Interaction Security and Privacy in the Digital Age Sergio Caltagirone University of Idaho 3/30/04.
ICC Module 3 Lesson 2 – Memory Hierarchies 1 / 25 © 2015 Ph. Janson Information, Computing & Communication Memory Hierarchies – Clip 8 – Example School.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Understand User Authentication LESSON 2.1A Security Fundamentals.
Grid Computing Security Mechanisms: the state-of-the-art
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Qishi Wu University of Memphis
Network Security Ola Flygt Växjö University
Unit 8 Network Security.
Introduction to Course
Session 1 – Introduction to Information Security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer Science & Communications Ph. Janson

ICC Module 3 Lesson 5 – IT Security 2 / 4 © 2015 Ph. Janson Motivation – The digital world needs to be secured just as much as the physical world Business is increasingly carried out on line … … hence more money and power pass through Internet … hence criminality and political actions are moving on line … … because they always follow money and power

ICC Module 3 Lesson 5 – IT Security 3 / 4 © 2015 Ph. Janson Objective – Explain how to secure the digital world ►What are some basic IT security principles and the main threats to IT systems, their content, and the privacy of their users and other individuals concerned by this content ? ►What are necessary defense mechanisms to protect information, the systems that process it, and the networks that transport it ?

ICC Module 3 Lesson 5 – IT Security 4 / 4 © 2015 Ph. Janson Outline ►Information security  Clip 1 Clip 1 Basic principles Threats Defenses  Clip 2 – Privacy (protection of Personal Information = PI) Clip 2  Clip 3 – Cryptography for confidentiality Clip 3  Clip 4 – Cryptography for integrity and digital signature Clip 4 ►Communications security (between computers)  Clip 5 – Authentication of users – Passwords Clip 5  Clip 6 – Authentication of users – Biometrics & tokens Clip 6  Clip 7 – Identification of users Clip 7 ►Computing security (inside computers)  Clip 8 Clip 8 Authorization and access control A few safety tips